./net/p5-IO-Socket-SSL, Perl5 SSL socket interface class

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 2.048, Package name: p5-IO-Socket-SSL-2.048, Maintainer: pkgsrc-users

IO::Socket::SSL is a class implementing an object-oriented interface
to SSL sockets. The class is a descendent of IO::Socket::INET and
provides a subset of the base class's interface methods as well as
SSL-specific methods.


Required to run:
[lang/perl5] [security/p5-Net-SSLeay] [net/p5-Net-LibIDN] [net/p5-IO-Socket-INET6] [security/p5-Mozilla-CA]

Required to build:
[pkgtools/cwrappers]

Master sites: (Expand)

SHA1: 8425911f9a1b26b7a8f91a62402fe5a2e0a28939
RMD160: ab94d429308c66b2cd641e6073292c977b574c87
Filesize: 209.889 KB

Version history: (Expand)


CVS history: (Expand)


   2017-04-19 15:46:18 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
Updated p5-IO-Socket-SSL to 2.048.

2.048 2017/04/16
- fixed small memory leaks during destruction of socket and context, RT#120643
   2017-02-19 09:49:46 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
Updated p5-IO-Socket-SSL to 2.047.

2.047 2017/02/16
- better fix for problem which 2.046 tried to fix but broke LWP this way
2.046 2017/02/15
- cleanup everything in DESTROY and make sure to start with a fresh %{*self}
  in configure_SSL because it can happen that a GLOB gets used again without
  calling DESTROY (https://github.com/noxxi/p5-io-socket-ssl/issues/56)
   2017-02-16 16:07:03 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
Updated p5-IO-Socket-SSL to 2.045.

2.045 2017/02/13
- fixed memory leak caused by not destroying CREATED_IN_THIS_THREAD for SSL
  objects -> github pull#55
- optimization: don't track SSL objects and CTX in *CREATED_IN_THIS_THREAD
  if perl is compiled w/o thread support
- small fix in t/protocol_version.t to use older versions of Net::SSLeay
  with openssl build w/o SSLv3 support
- when setting SSL_keepSocketOnError to true the socket will not be closed
  on fatal error. This is a modified version of
  https://github.com/noxxi/p5-io-socket-ssl/pull/53/
   2017-02-07 13:02:04 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
Updated p5-IO-Socket-SSL to 2.044.

2.044 2017/01/26
- protect various 'eval'-based capability detections at startup with a localized
  __DIE__ handler. This way dynamically requiring IO::Socket::SSL as done by
  various third party software should cause less problems even if there is a
  global __DIE__ handler which does not properly deal with 'eval'.
   2017-01-16 10:28:46 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
Updated p5-IO-Socket-SSL to 2.043.

2.043 2017/01/06
- make t/session_ticket.t work with OpenSSL 1.1.0. With this version the
  session does not get reused any longer if it was not properly closed which
  is now done using an explicit close by the client which causes a
  proper SSL_shutdown
2.042 2017/01/05
- enable session ticket callback with Net::SSLeay>=1.80
   2017-01-04 15:44:23 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
Updated p5-IO-Socket-SSL to 2.041.

2.041 2017/01/04
- leave session ticket callback off for now until the needed patch is
  included in Net::SSLeay. See
  https://rt.cpan.org/Ticket/Display.html … xn-1696146
   2016-12-19 10:32:48 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
Updated p5-IO-Socket-SSL to 2.040.

2.040 2016/12/17
- fix detection of default CA path for OpenSSL 1.1.x
- Utils::CERT_asHash now includes the signature algorithm used
- Utils::CERT_asHash can now deal with large serial numbers
   2016-11-28 14:00:16 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
Updated p5-IO-Socket-SSL to 2.039.

2.039 2016/11/20
- OpenSSL 1.1.0c changed the behavior of SSL_read so that it now returns -1 on
  EOF without proper SSL shutdown. Since it looks like that this behavior will
  be kept at least for 1.1.1+ adapt to the changed API by treating errno=NOERR
  on SSL_ERROR_SYSCALL as EOF.